Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

BYOD is DEAD

No description
by

Amar Singh

on 29 October 2013

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of BYOD is DEAD

Opportunity
So ...
Overview
No this is not a anti or pro-mobile device presentation

Yes I will cover the risks

BUT, I want to share some new thoughts and Ideas
Stats &
Figures!

So, You Want To Have a Free For All Policy?
Notice to All Marketing FOLKS:
BYOD is DEAD
Go find a new Acronym
Bring All Your Devices
Some other titles I thought of:
New Mobile Device Policy:
No Smart Devices Allowed: Includes: Phone, tablet, (even Phablets) watch, wristband, goggles, scan
Thinking Differently in an Always Connected World
1.5B Smart Phones
Who knows how many phones in the market?
5B Phones in the World
The Tablet Icing on the Cake? -

Tablets (and Phablets) have surpassed Desktops & Laptops in Q4:12
And.. we have not covered wearables, scannables, flyables, etc etc
"I have a BYOD Policy:"
What a CISO told me when asked about BYOD Security
Who knows what QR codes are?
Two Important Concepts
Everyone's heard of Cyber space?
Corporate Cyber Space
Personal Cyber Space
Like
B = Bring
A = All
Y = Your
D = Devices
RISKS
Data Theft
****n things are Always connected..
Fortunately, the batteries are crap so the power dies in a few hours
Data Contamination
Who wants all their photos & contacts deleted when they leave their current employment?
Discovery
& Once you find all of them - Pain to manage
Anyone see anything else?
Who has taken their employee to court?
Repetitive Stress or other litigation?
The next Frontier for security researchers
Malware & Compromise:
The Cloud Security Alliance:
Data Loss and data leakage through poorly written third-party applications
NFC and proximity-based hacking
Insufficient management tools, capabilities, and access to APIs (includes personas)
Unsecured or rogue marketplaces
Unsecured WiFi, network access, and rogue access points
Vulnerabilities within devices, OS, design, and third-party applications
New Apps Are All COOL!, Really
Linkedin's Intro?
To Containerise Or Not?
Your CFO/CEO may actually say thank you
Warning!
On average $80/-- Per user savings.
Good Technology State of BYOD Report states:

“50 percent of companies with BYOD models are requiring employees to cover all costs -- and they are happy to do so.”
BTW: My new name is
Good Singh :)
Jury is still out:

But I often wish Container like technology existed for regular devices (laptops etc)
Personal Cyber Space is:
Did not exist 5 - 10 years ago!
Is Accessible everywhere anytime & more relevant
Will consist of every connected device including: car, fridge, watch, washing machine, dog? phone, tablet, bracelet, etc etc
Seize the Opportunity
Help your employees protect their own Personal Cyber Space
Provide them the awareness to protect their bank accounts, their photos
Trust & Responsibility: Big words yes, but new generation of employees are very tech savy..

Share responsibility (legal folks & HR will not like what I say)
Respondents in the emerging, “high-growth” markets (including Brazil, Russia, India, UAE, and Malaysia) demonstrate a much higher propensity to use their own device at work.

Almost 75% of users in these countries did so, compared to 44% in the more mature developed markets.
79% of employees in high growth markets believe that constant connectivity with work applications enables them to their job better, versus 53.5% in mature markets.
Not the same as Accountability
You have to control the entire Device to protect data - that means, BYOD actually means.. Bring a Device of My choice that actually belongs To you
The entire device has to be managed to protect data because there's no control over where data resides. A confidential attachment in the Mail.App can be saved to Dropbox without the administration knowing at all. No control for administrators.
No password protecting access to Mail, contacts, calendar and documents, except for the passcode to the device
Advantages of Container
No encryption of data anywhere
Corporate environments can know exactly what apps you're installing and block apps without further instructions
I cannot play Angry Birds!
Save a file to iCloud, or a calendar, or contact and suddenly it's on your iPad, your wife's iPad, your iPhone, your Mac and iCloud.com
Password protected access (protected by your AD credentials) so users do not have to learn ANOTHER password.
Container is 100% AES 256% encrypted and does not get backed up to iCloud
Data never leaves the container - what happens in the container, remains in the container
Corporate environment only has to protect the container - can govern what users can and cannot use
Thank you for your time!
Please feel free to connect.
Global - Chief Information Security Officer at a FTSE 100 Company
Amar Singh
Feel Free to Share & Get in Touch
Information Governance, Risk & Compliance Expert
My Personal Views Only
@amisecured
amar@asingh.me
Chair of ISACA United Kingdom
Security Advisory Group
prezi.com/user/amarsingh/
(Yes, it's called SAG for short)
Global - Chief Information Security Officer at a FTSE 100 Company
Amar Singh
Feel Free to Share & Get in Touch
Information Governance, Risk & Compliance Expert
My Personal Views Only
@amisecured
amar@asingh.me
Chair of ISACA United Kingdom
Security Advisory Group
prezi.com/user/amarsingh/
(Yes, it's called SAG for short)
Full transcript